Hiroki IKEDA Jun SUGAWA Yoshihiro ASHI Kenichi SAKAMOTO
We propose an IP broadcasting system architecture using passive optical networks (PON) utilizing the optical broadcast links of a PON with a downstream bandwidth allocation algorithm to provide a multi-channel IP broadcasting service to home subscribers on single broadband IP network infrastructures. We introduce the design and adaptation of the optical broadcast links to effectively broadcast video contents to home subscribers. We present a performance analysis that includes the downstream bandwidth utilization efficiency of the broadcast link and the bandwidth control of the IP broadcasting and Internet data. Our analysis and simulation results show that the proposed system can provide 100 HDTV channels to every user over fiber lines. We also propose an IPTV channel selection mechanism in an ONT by selecting a broadcast stream. We developed and evaluated a prototype that can achieve a 15-msec IPTV channel selection speed.
Abhay GHATPANDE Hidenori NAKAZATO Olivier BEAUMONT Hiroshi WATANABE
Divisible Load Theory (DLT) is an established mathematical framework to study Divisible Load Scheduling (DLS). However, traditional DLT does not address the scheduling of results back to source (i.e., result collection), nor does it comprehensively deal with system heterogeneity. In this paper, the DLSRCHETS (DLS with Result Collection on HETerogemeous Systems) problem is addressed. The few papers to date that have dealt with DLSRCHETS, proposed simplistic LIFO (Last In, First Out) and FIFO (First In, First Out) type of schedules as solutions to DLSRCHETS. In this paper, a new polynomial time heuristic algorithm, SPORT (System Parameters based Optimized Result Transfer), is proposed as a solution to the DLSRCHETS problem. With the help of simulations, it is proved that the performance of SPORT is significantly better than existing algorithms. The other major contributions of this paper include, for the first time ever, (a) the derivation of the condition to identify the presence of idle time in a FIFO schedule for two processors, (b) the identification of the limiting condition for the optimality of FIFO and LIFO schedules for two processors, and (c) the introduction of the concept of equivalent processor in DLS for heterogeneous systems with result collection.
Yoshitaka ENOMOTO Hisashi IZUMITA Nobuo TOMITA
This paper describes a novel optical fiber line testing system operating at 1.65 µm using test light bypass modules. We show a new testing configuration for add/drop multiplexer (ADM) ring networks. The test light bypass modules were installed in individual customer buildings so the test light can bypass the ADMs. We evaluated the bit-error performance with a 2.48832 Gbit/s ADM ring network using a prototype test light bypass module. We confirmed that this testing system can monitor the optical fiber cables of an ADM ring network, and that it causes no degradation in transmission quality. We show the operating area provided by the system dynamic range expressed in terms of fiber length and customer building number. The prototype system could monitor an ADM ring network linking five buildings with a 5 km loop. We also performed an in-service monitoring field trial in a 2.6 km ring network with three ADM nodes. This testing system enables us to reduce the operating, administration, and maintenance cost and improves the transmission quality of ADM ring networks.
The manifold-ranking algorithm has been successfully adopted in content-based image retrieval (CBIR) in recent years. However, while the global low-level features are widely utilized in current systems, region-based features have received little attention. In this paper, a novel attention-driven transductive framework based on a hierarchical graph representation is proposed for region-based image retrieval (RBIR). This approach can be characterized by two key properties: (1) Since the issue about region significance is the key problem in region-based retrieval, a visual attention model is chosen here to measure the regions' significance. (2) A hierarchical graph representation which combines region-level with image-level similarities is utilized for the manifold-ranking method. A novel propagation energy function is defined which takes both low-level visual features and regional significance into consideration. Experimental results demonstrate that the proposed approach shows the satisfactory retrieval performance compared to the global-based and the block-based manifold-ranking methods.
Khoirul ANWAR Masato SAITO Takao HARA Minoru OKADA
In this paper, a new large spreading code set with a uniform low cross-correlation is proposed. The proposed code set is capable of (1) increasing the number of assigned user (capacity) in a multicarrier code division multiple access (MC-CDMA) system and (2) reducing the peak-to-average power ratio (PAPR) of an orthogonal frequency division multiplexing (OFDM) system. In this paper, we derive a new code set and present an example to demonstrate performance improvements of OFDM and MC-CDMA systems. Our proposed code set with code length of N has K=2N+1 number of codes for supporting up to (2N+1) users and exhibits lower cross correlation properties compared to the existing spreading code sets. Our results with subcarrier N=16 confirm that the proposed code set outperforms the current pseudo-orthogonal carrier interferometry (POCI) code set with gain of 5 dB at bit-error-rate (BER) level of 10-4 in the additive white Gaussian noise (AWGN) channel and gain of more than 3.6 dB in a multipath fading channel.
Alex CARTAGENA GORDILLO Ryuji KOHNO
In this paper, we propose a method for designing a set of pulses whose spectrum is efficiently contained in amplitude and bandwidth. Because these pulses are derived from and have shapes that are either equal or similar to the Hermite pulses, we name our proposed transmit pulses as spectrally efficient Hermite pulses. Given that the proposed set of pulses does not constitute an orthonormal one, we also propose a set of receive templates which permit orthonormal detection of the incoming signals at the receiver. The importance of our proposal is in the potential implementation of M-ary pulse shape modulation systems, for ultra wideband communications, with sets of pulses that are efficiently contained within a specific bandwidth and limited to a certain amplitude.
Combining relaying and multi-input multi-output (MIMO) transmission is a generic way to overcome the channel-fading impairments. Best antenna selection is a simple but efficient MIMO method that achieves the full diversity and also serves as a lower bound reference of MIMO performance. For a dual-hop MIMO system with an ideal amplify-and-forward (AF) relaying gain and best antenna selection, we provide a probability density function (PDF) of received signal-to-noise ratio (SNR) and an analytic BER equation when using M-ary PSK in Rayleigh fading channels. The analytic result is shown to exactly match with simulated one. Furthermore, the effect of link unbalance between the first hop and the second hop, due to differences in the number of antennas deployed in both hops as well as in the average power of channel coefficients, on the BER performance is numerically investigated and the results show that the links with better balance give better performance.
This paper presents a new adaptive minor subspace extraction algorithm based on an idea of Peng and Yi ('07) for approximating the single minor eigenvector of a covariance matrix. By utilizing the idea inductively in the nested orthogonal complement subspaces, the proposed algorithm succeeds to relax the numerical sensitivity which has been annoying conventional adaptive minor subspace extraction algorithms for example, Oja algorithm ('82) and its stabilized version: O-Oja algorithm ('02). Simulation results demonstrate that the proposed algorithm realizes more stable convergence than O-Oja algorithm.
Umut YUNUS Masaru TSUNASAKI Yiwei HE Masanobu Kominami Katsumi YAMASHITA
Gas or water leaks in pipes that are buried under ground or that are situated in the walls of buildings may occur due to aging or unpredictable accidents, such as earthquakes. Therefore, the detection of leaks in pipes is an important task and has been investigated extensively. In the present paper, we propose a novel leak detection method by means of acoustic wave. We inject an acoustic chirp signal into a target pipeline and then estimate the leak location from the delay time of the compressed pulse by passing the reflected signal through a correlator. In order to distinguish a leak reflection in a complicated pipeline arrangement, the reflection characteristics of leaks are carefully discussed by numerical simulations and experiments. There is a remarkable difference in the reflection characteristics between the leak and other types of discontinuity, and the property can be utilized to distinguish the leak reflection. The experimental results show that, even in a complicated pipe arrangement including bends and branches, the proposed approach can successfully implement the leak detection. Furthermore, the proposed approach has low cost and is easy to implement because only a personal computer and some commonly equipment are required.
In this letter a new structure of multifunctional frequency filter using a universal voltage conveyor (UVC) is presented. The multifunctional circuit can realize a low-pass, high-pass and band-pass filter. All types of frequency filter can be realized as inverting or non-inverting. Advantages of the proposed structure are the independent control of the quality factor at the cut-off frequency and the low output impedance of output terminals. The computer simulations and measuring of particular frequency filters are depicted.
Chuntao WANG Jiangqun NI Rongyue ZHANG Goo-Rak KWON Sung-Jea KO
Robustness and invisibility are two contrary constraints for robust invisible watermarking. Instead of the conventional strategy with human visual system (HVS) model, this paper presents a content-adaptive approach to further optimize the constraint between them. To reach this target, the entropy-based and integrated HVS (IHVS) based measures are constructed so as to adaptively choose the suitable components for watermark insertion and detection. Such a kind of scheme potentially gives rise to synchronization problem between the encoder and decoder under the framework of blind watermarking, which is then solved by incorporating the repeat-accumulate (RA) code with erasure and error correction. Moreover, a new hidden Markov model (HMM) based detector in wavelet domain is introduced to reduce the computation complexity and is further developed into a posterior one to avoid the transmission of HMM parameters with only a little sacrifice of detection performance. Experimental results show that the proposed algorithm can obtain considerable improvement in robustness performance with the same distortion as the traditional one.
Todorka ALEXANDROVA Hiroyoshi MORITA
Constructing ideal (t,n) threshold secret sharing schemes leads to some limitations on the maximum number of users, that are able to join the secret sharing scheme. We aim to remove these limitations by reducing the information rate of the constructed threshold secret sharing schemes. In this paper we propose recursive construction algorithms of (t,n) threshold secret sharing schemes, based on the generalized vector space construction. Using these algorithms we are able to construct a (t,n) threshold secret sharing scheme for any arbitrary n.
Liangpeng GUO Yici CAI Qiang ZHOU Xianlong HONG
Multiple supply voltage (MSV) is an effective scheme to achieve low power. Recent works in MSV are based on physical level and aim at reducing physical overheads, but all of them do not consider level converter, which is one of the most important issues in dual-vdd design. In this work, a logic and layout aware methodology and related algorithms combining voltage assignment and placement are proposed to minimize the number of level converters and to implement voltage islands with minimal physical overheads. Experimental results show that our approach uses much fewer level converters (reduced by 83.23% on average) and improves the power savings by 16% on average compared to the previous approach [1]. Furthermore, the methodology is able to produce feasible placement with a small impact to traditional placement goals.
Space-time trellis coding systems employing orthogonal frequency division multiplexing technique over frequency-selective channels is considered, where fading gains vary within a frame interval. The channel time-evolution of each sub-carrier is modeled by an autoregressive process, while the receiver utilizing a recursive technique combining Kalman filtering with per-survivor processing is studied.
Young-Ho SEO Hyun-Jun CHOI Chang-Yeul LEE Dong-Wook KIM
This paper is to propose a digital watermarking to protect the ownership of a video content which is compressed by H.264/AVC main profile. This scheme intends to be performed during the CABAC (Context-based Adaptive Binary Arithmetic Coding) process which is the entropy coding of the main profile. It uses the contexts extracted during the context modeling process of CABAC to position the watermark bits by simply checking the context values and determining the coefficients. The watermarking process is also as simple as replacing the watermark bit with the LSB (Least Significant Bit) of the corresponding coefficient to be watermarked. Experimental results from applying this scheme and attacking in various ways such as blurring, sharpening, cropping, Gaussian noise addition, and geometrical modification showed that the watermark embedded by this scheme has very high imperceptibility and robustness to the attacks. Thus, we expect it to be used as a good watermarking scheme, especially in the area that the watermarking should be performed during the compression process with requiring minimal amount of process for watermarking.
Tomohiro INAGAKI Toshimichi SAITO
This letter studies response of a chaotic spiking oscillator to chaotic spike-train inputs. The circuit can exhibits a variety of synchronous/asynchronous phenomena and we show an interesting phenomenon "consistency": the circuit can exhibit random response that is identical in steady steady state for various initial values. Presenting a simple test circuit, the consistency is confirmed experimentally.
To design secure blockciphers, estimating immunity against differential attack and linear attack is essential. Recently, Diffusion Switching Mechanism (DSM) is proposed as a design framework to enhance the immunity of Feistel structure against differential attack and linear attack. In this paper, we give novel results on the effect of DSM on three generalized Feistel structures, i.e. Type-I, Type-II and Nyberg's structures. We first show a method for roughly estimating lower bounds of a number of active S-boxes in Type-I and Type-II structures using DSM. Then we propose an improved search algorithm to find lower bounds for generalized structures efficiently. Experimental results obtained by the improved algorithm show that DSM raises lower bounds for all of the structures, and also show that Nyberg's structure has the slowest diffusion effect among them when SP-type F-functions are used.
Koichi ICHIGE Kazuhiko SAITO Hiroyuki ARAI
This paper presents a high resolution Direction-Of-Arrival (DOA) estimation method using unwrapped phase information of MUSIC-based noise subspace. Superresolution DOA estimation methods such as MUSIC, Root-MUSIC and ESPRIT methods are paid great attention because of their brilliant properties in estimating DOAs of incident signals. Those methods achieve high accuracy in estimating DOAs in a good propagation environment, but would fail to estimate DOAs in severe environments like low Signal-to-Noise Ratio (SNR), small number of snapshots, or when incident waves are coming from close angles. In MUSIC method, its spectrum is calculated based on the absolute value of the inner product between array response and noise eigenvectors, means that MUSIC employs only the amplitude characteristics and does not use any phase characteristics. Recalling that phase characteristics plays an important role in signal and image processing, we expect that DOA estimation accuracy could be further improved using phase information in addition to MUSIC spectrum. This paper develops a procedure to obtain an accurate spectrum for DOA estimation using unwrapped and differentiated phase information of MUSIC-based noise subspace. Performance of the proposed method is evaluated through computer simulation in comparison with some conventional estimation methods.
Weidong TIAN Joe R. TROGOLO Bob TODD
Capacitor mismatch is an important device parameter for precision analog applications. In the last ten years, the floating gate measurement technique has been widely used for its characterization. In this paper we describe the impact of leakage current on the technique. The leakage can come from, for example, thin gate oxide MOSFETs or high dielectric constant capacitors in advanced technologies. SPICE simulation, bench measurement, analytical model and numerical analyses are presented to illustrate the problem and key contributing factors. Criteria for accurate capacitor systematic and random mismatch characterization are developed, and practical methods of increasing measurement accuracy are discussed.
Hai-yang LIU Xiao-yan LIN Lian-rong MA Jie CHEN
The stopping distance and stopping redundancy of a linear code are important concepts in the analysis of the performance and complexity of the code under iterative decoding on a binary erasure channel. In this paper, we studied the stopping distance and stopping redundancy of Finite Geometry LDPC (FG-LDPC) codes, and derived an upper bound of the stopping redundancy of FG-LDPC codes. It is shown from the bound that the stopping redundancy of the codes is less than the code length. Therefore, FG-LDPC codes give a good trade-off between the performance and complexity and hence are a very good choice for practical applications.